Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
World Cup Security Issues
06/25/2014

Riot police carrying massive plastic shields and dressed head to toe in body armor clashed with thousands of demonstrators in downtown São Paulo near the Carrão station Thursday morning. Security forces fired tear gas into the crowd with many protesters injured, Fox News Latino reporters witnessed.

Iraqi Security
06/24/2014

The crisis in Iraq has prompted U.S. contractors with personnel there to evacuate them from areas near Baghdad that are increasingly in the line of fire as insurgent fighters capture more territory with the apparent end goal of seizing the Iraqi capital.

The individuals are being temporarily relocated by their companies due to security concerns in the area, State Department spokeswoman Jen Psaki said in a statement Thursday evening. The individuals involved include U.S. citizens who are currently working under contract with Iraqs central government in support of the Pentagons foreign weapons sales program.

Embassy Insecurity
06/23/2014

Private firms that provide local security guards to protect U.S. embassies abroad have failed to comply with vetting requirements for the local guards, placing American diplomatic posts and personnel at potential risk, an audit report by the State Department inspector general's office found.

The audit, which was released Friday, identifies significant breakdowns in processes put in place to ensure the suitability of local guards working at U.S. posts overseas.

Of six security contractors reviewed by the inspector general, none had fully performed all the screening requirements for the local guards who provide an important layer of security at embassies. One guard was found to be on duty at a U.S. post before officials discovered his criminal background and false identities.

McCain Calls for Resignation of National Security Team
06/20/2014

As an al-Qaeda-linked terrorist army sweeps across Syria into the heart of Iraq and the US dithers on whether to intervene, John McCain launched a broadside against the Obama administration from the Senate floor earlier today. McCain demanded the immediate resignation of the entire White House national security team, advising Barack Obama that he has been ill served by their advice and their decisions. McCain urged that anyone who declared the withdrawal from Iraq a success should be canned, which would include Obama himself, although McCain stopped short of that demand.

Security Needs Evolve as Computing Leaves the Office
06/19/2014

Five years ago, people still spoke of cloud adoption as if they had a choice.

But at company after company, cloud computing facilities miles away have replaced computer rooms down the office hall, and what once seemed like a choice now looks like an inevitability.

Businesses are turning to the cloud — that nebulous term that describes computing and applications run remotely over the Internet — to handle their data and computing faster and cheaper, relying on providers like Amazon, Google, SoftLayer, Rackspace and others.

Liberty vs. Security in post-911 World
06/18/2014

While the materials Edward Snowden copied and disseminated during his stint as a National Security Agency contractor put the nations security policies under an unprecedented microscope, many in and out of government had been worried about whether the post-911 security fetish was undermining basic constitutional liberties.

Sen. Ron Wyden, Oregon Democrat, had been warning in vague terms for some time that he thought the National Security Agency was overstepping its bounds. But he could say very little because of the highly classified nature of the information he obtained as a member of the Select Committee on Intelligence.

Apple Shared
06/17/2014

Apples march toward seamless integration between the Mac, iPhone and iPad worries some security experts who say companies may find it more difficult to prevent data leakage on the devices.

On Monday, Apple introduced Handoff, a feature in upcoming iOS 8 and Mac OS X Yosemite that would let a person start a task on one device and complete it on another. For example, an email started on the Mac could be completed later on the iPad.

NYC Public Housing Lacks Security Cameras
06/16/2014

In a city where security cameras have become ubiquitous since 9/11, some of the biggest surveillance gaps are in the neighborhoods of New York where poverty and violent crime remain among the highest: public housing projects.

The oversight became apparent this week after the horrific stabbing of two children in a housing project elevator that left one dead and the other in critical condition. No cameras were in place to capture an image of the suspect. Police, however, arrested a suspect days later on Wednesday.

Nearly 60 percent of the citys public housing buildings — home to more than 615,000 New Yorkers — do not have operational security cameras

Imposing Security
06/13/2014

Computer programmers will not stop making dangerous errors on their own. It is time they adopted an idea that makes the physical world safer.

Three computer bugs this year exposed passwords, e-mails, financial data, and other kinds of sensitive information connected to potentially billions of people. The flaws cropped up in different places—the software running on Web servers, iPhones, the Windows operating system—but they all had the same root cause: careless mistakes by programmers.

Midsize Companies Face Supersize Threats
06/12/2014

The number of cyber attacks against midsize companies has doubled in the last year. And cost per employee is more than three times that of larger companies. While midsize organizations often lack the sophisticated defenses of large enterprises, many fail to recognize their vulnerability and are overconfident in their ability to spot and counter threats.

Skype Security Issues
06/11/2014

Microsofts Skype is an extremely popular VoIP/video conferencing tool that is used by both individuals and business organizations, but with over 300 million users, the security risks affecting it have an even bigger impact.

According to Solutionarys May Threat Report, the fact that Skype keeps personally identifiable information, alongside chat transcripts in an unencrypted file on the local system, makes users vulnerable.

What does this mean? It means that anyone that has the knowledge and skill to hack a Skype user can easily get access to personal information without actually having to hack into Microsoft’s servers

Educastional Security
06/10/2014

But with the gathering of more data, schools have more responsibility to ensure a students privacy is safeguarded. Many parents are now asking schools about how their kids data is being secured. There are Federal laws in place to guide districts on protecting student privacy. These include  FERPA, COPPA, PPRA and even HIPAA regulations that help give districts some guidelines on privacy and security, but many of these regulations were created before the massive adoption of technology in schools and the laws have not kept pace with classroom realities. This places the burden of creating more modern plans for minors privacy and security on states and districts.

Do You Know Where Your Security Is?
06/09/2014

On Tuesday, Google published a full account of the current state of encryption in email, revealing that some leading providers like Comcast and Frances Orange encrypted nearly none of the email that approached its servers. The news this week seemed to confirm many of our worst fears about the state of security on the Internet as it does most weeks.

TrueCrypt Security
06/06/2014

TrueCrypt, the whole-disk encryption tool endorsed by National Security Agency leaker Edward Snowden and used by millions of privacy and security enthusiasts around the world, will receive a second round of safety audits despite being declared unsafe and abruptly abandoned by its anonymous developers two days ago.

Phase II of the security audit was already scheduled to commence when Wednesday's bombshell advisory dropped on the TrueCrypt SourceForge page.

Snowdens Damage
06/05/2014

Former National Security Agency director Michael Hayden, speaking on CBSs Face the Nation, insisted that Edward Snowden has harmed national security by disclosing previously classified NSA data-collection programs to The Washington Post and other news media outlets.

Unquestionable, irreparable, irreversible harm, Hayden said Sunday morning, responding to an interview that Snowden did last week — the former NSA contractor's first in the year since he leaked the documents.

During the interview with NBCs Brian Williams, Snowden said the United States has not proven that the documents he released have done any harm to national security or counterterrorism efforts.

Hayden insisted that damage had been done.

Security Tour
06/03/2014

With the long history of battles for democracy in Europe shadowing him, President Obama on Monday embarks on a week-long trip to Poland, Belgium and France that he hopes will convince the world that the United States remains a bulwark defending democratic government at the same time it closes the book on more than a decade of war.

Facebook Partnership for Security
06/02/2014

With more than 1.2 billion users, Facebook is a tempting target for spammers and criminals. You have likely seen their work before: seemingly legitimate posts in your news feed perpetuated by friends with infected accounts.

Malware comes in many forms on Facebook, most often in posts with a level of shock, horror, or salaciousness, such as a video that promises a peek into a celebrity sex tape or a video of something gruesome. If you become infected, the malware may collect information from your account, send status updates or messages that look like they are from you, or cover your account with ads that crash your computer, Facebook said.

To combat this problem, the social network announced a partnership with Trend Micro and F-Secure to offer free antimalware scanning that alerts you when it detects that your device may be infected.

EBay Lessons Learned
06/01/2014

Parts of America will just be waking up as I write, to the news that there is a security glitch on eBay. The company is advising people to change their passwords. Others will be commenting on the security implications but what can the small business community learn from this incident?

It is worth looking at what some of the experts have offered up, unbidden, into my mailbox as a journalist. European security company Kaspersky gave out a few paragraphs, including: The worrying thing is that many people use a single password for more than one internet site and so if the passwords are compromised, they could be at further risk from cyber-criminal activity. The time lapse here highlights the urgency for customers to change not only their eBay and PayPal passwords but also on any other site that they use the same log-in details for.



Current Blog

2014 Security Blog Archive
June Archive
May Archive
April Archive
March Archive
Jan & February Archive

2013 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.